Preferred Language
Articles
/
jih-90
Synthesis and Characterization of Schiff Base Derived From Chitosan and Its Complexes With (Co+2, Ni+2 and Cu+2)
...Show More Authors

     In this research, new Schiff base is derived from chitosan O-nitrobenzyldehyde and its complexes were synthesized. All compounds were characterized by FT-IR, UV-Visible, TGA, DTA, TG and molar conductivity with melting point. The results showed that Schiff base was coordinated via  nitrogen atom azomethine with the center metal ions Co+2,Ni+2 and Cu+2 behaving monodentate ligand and forming complexes with molecular formula [M(L)Cl2H2O] The tetrahedral geometrical was suggested for all prepared complexes based on the characterization data for all techniques.   +2,Cu+2, Ni+2M = Co   

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
...Show More Authors

This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
Deception in Amber Heard and Johnny Depp’s Trials
...Show More Authors

Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Produced Water Treatment Using Ultrafiltration and Nanofiltration Membranes
...Show More Authors

The application of ultrafiltration (UF) and nanofiltration (NF) processes in the handling of raw produced water have been investigated in the present study. Experiments of both ultrafiltration and nanofiltration processes are performed in a laboratory unit, which is operated in a cross-flow pattern. Various types of hollow fiber membranes were utilized in this study such as poly vinyl chloride (PVC) UF membrane, two different polyether sulfone (PES) NF membranes, and poly phenyl sulfone PPSU NF membrane. It was found that the turbidity of the treated water is higher than 95 % by using UF and NF membranes. The chemical oxygen demand COD (160 mg/l) and Oil content (26.8 mg/l) were found after treatment according to the allowable limits set

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
On Large-Small submodule and Large-Hollow module
...Show More Authors
Abstract<p>The goal of this research is to introduce the concepts of Large-small submodule and Large-hollow module and some properties of them are considered, such that a proper submodule N of an R-module M is said to be Large-small submodule, if N + K = M where K be a submodule of M, then K is essential submodule of M ( K ≤<sub>e</sub> M ). An R-module M is called Large-hollow module if every proper submodule of M is Large-small submodule in M.</p>
View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Directive and Steerable Radiation Pattern using SASPA Array
...Show More Authors

This work examines the ability of a special type of smart antenna array known as Switched Active Switched Parasitic Antenna (SASPA) to produce a directive and electronically steerable radiation pattern. The SASPA array consists of antenna elements that are switchable between active and parasitic states by using P-Intrinsic-N (PIN) diodes. The active element is the element that is supplied by the radio frequency while short-circuiting the terminals of an element in the array results in a parasitic element. Due to the strong mutual coupling between the elements, a directional radiation pattern with high gain and a small beamwidth can be produced with only one active element operating at a time. By changing the parasitic state to the active

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Educational values and their role in some religions
...Show More Authors

                           
 The Islamic religion approach Rabbani urges and seeks to bring happiness to people, as Allah says: ((We sent thee not all people glad tidings and a warner, but most people do not know)) Spa: State 28
   Islam looks at the concept of educational values ​​through positive behavior derived emerging through formal and informal education. The Islamic approach works on the basis of a systematic and clear rule in the form of an integrated system includes multiple areas. As the lead actor role as the desired position.
  Although 

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2018
Journal Name
Journal Of The College Of Education For Women
The Ecologia and Abbasid's Community/ Historical-Ecological Study
...Show More Authors

The study includes the relationship between the ecologia and Abbaside's community in the middle ages, and the role of Baghdad capital city to increasing the sensibility of the people to the outwardly peripheral.

The study explains the efforts between the people and Abbaside's government to cure the knowledge of ecologia, to prevent the separation of diseases and  pollutions of the community. 

 Keywords: Ecologia, Abbasid's, diseases, pollutions.

View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Medical Ultrasound Image Quality Enhancement and Regions Segmentation
...Show More Authors

     Medical Ultrasound (US) has many features that make it widely used in the world. These features are safety, availability and low cost. However, despite these features, the ultrasound suffers from problems. These problems are speckle noise and artifacts. In this paper, a new method is proposed to improve US images by removing speckle noise and reducing artifacts to enhance the contrast of the image. The proposed method involves algorithms for image preprocessing and segmentation. A median filter is used to smooth the image in the pre-processing. Additionally, to obtain best results, applying median filter with different kernel values. We take the better output of the median filter and feed it into the Gaussian filter, which then

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref